General
-
Target
1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574
-
Size
7.2MB
-
Sample
210810-rak3apmmw2
-
MD5
9cd27149543000c7f93e9943ecb9847e
-
SHA1
44ac42e9cfed91c80fb92600d522b674edbd3253
-
SHA256
1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574
-
SHA512
f17dfb4095d094bfd8cc01e639bbf518798b700ebf2959cc8fe224beeca7e458a758c22d11fe0c45daff8cbe3ce1dcabb67f2969179ad27af99b2cef6c4549ec
Static task
static1
Behavioral task
behavioral1
Sample
1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574
-
Size
7.2MB
-
MD5
9cd27149543000c7f93e9943ecb9847e
-
SHA1
44ac42e9cfed91c80fb92600d522b674edbd3253
-
SHA256
1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574
-
SHA512
f17dfb4095d094bfd8cc01e639bbf518798b700ebf2959cc8fe224beeca7e458a758c22d11fe0c45daff8cbe3ce1dcabb67f2969179ad27af99b2cef6c4549ec
Score10/10-
Klingon RAT Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-